The following appeared in the Canadian online magazine Security Matters: Location Based Services: Do you know where your data is? Do you know where your data is? By Christopher Burgess Everywhere you look, retailers and other entities are offering to collect your data using one of the many location-based services available to collate your whereabouts and analyze your behavior. Are …
Are You a Demanding User?
By Christopher Burgess Do you work for an enterprise or a small-to-medium-size business? If so, odds are you have an information technology department supporting you. If you work for yourself, you may leverage the knowledge of others in cobbling together an information technology infrastructure to support your daily work. I work for a conglomerate and rely on an IT department …
Out of Control User = Frenetic IT
By Christopher Burgess When you access your email each day, do you do so at a distance of 15 paces because you’re just not sure what might jump out of that inbox? You can just about anticipate an email detailing how another user has caused a “blip” that will stretch your capabilities to protect both the user during their online …
Crimeware – a book review by Christopher
Five stars to Jakobsson & Ramzan for a most useful guide to understanding the underbelly of the internet. The strength exhibited by this book lies within the all-star lineup of contributors and the thorough dissection of the numerous forms of crimeware. Their book is a must read for anyone who has responsibility or an interest in protecting Personal Identifying Information (PII), Private Consumer Information (PCI) or Intellectual Property (IP).
2006 – Presentations by Christopher Burgess
The year 2006 was an interesting one, with my public speaking engagements limited, as I transitioned from a government executive to a corporate executive. I largely focused my presentations on the various aspects of industrial and corporate espionage, and finished the book, Secrets Stolen, Fortunes Lost. Speaking at the Anti Phishing Working Group on the art of targeted online attacks …